[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips June 7, 2002
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, CSSP <cssp@xxxxxxx>;, glee@xxxxxxxxxxxxx;, Charlie Oriez <coriez@xxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, computer_security_day@xxxxxxx;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;
- Subject: Clips June 7, 2002
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Fri, 07 Jun 2002 15:30:15 -0400
- Cc: lillie@xxxxxxx
Clips June 7, 2002
ARTICLES
Bush proposes massive overhaul of homeland security agencies
Rowley Criticizes FBI Bureaucracy
TSA plans two smart card pilot projects
DOD looks closer at promising technologies
PUC Introduces 'Bill of Rights' for Phone Users
Pa. creates cybercrime task force
Online Movie Site Closed Down
Copyfight Renewal -- Owners of Digital Devices Sue to Assert the Right to
Record
Man Remains Jailed Over Web Postings
Security Hole Found in KaZaA File-Sharing Service
Forman Pushes E-gov into Homeland Security Arena
Liberties Group Sues Studios Over Consumers' Use of Digital Devices
Public or Private? Which is the Internet
Analyzer gets 18-month jail term
Half of Germans don't want internet access
Government in Spain promises internet for all by 2004
Turkish internet law faces strong opposition
Eight people injected with silicon chips
Stolen moments (Article on Internet Piracy)
Are you switched on? turn viewers into active participants
Homeland security plan skimps on tech
*******************
Government Executive
Bush proposes massive overhaul of homeland security agencies
By Jason Peckenpaugh
jpeckenpaugh@xxxxxxxxxxx
In what would be the biggest restructuring of government since World War
II, President Bush proposed Thursday to move seven entire agencies and
offices from several others into a new cabinet-level Department of Homeland
Security.
"This reorganization will give the good people of our government the best
chance to succeed," said Bush in a televised address from the White House.
"Employees of this new agency will come to work every morning knowing their
most important job is to protect their fellow citizens."
The new department would include the Federal Emergency Management Agency,
Coast Guard, Transportation Security Administration, Customs Service,
Immigration and Naturalization Service (including the Border Patrol),
Animal and Plant Health Inspection Service, and Secret Service.
Offices of some other agencies would also be absorbed, such as the Commerce
Department's Critical Infrastructure Assurance Office; the National
Domestic Preparedness Office and the National Infrastructure Protection
Center at the FBI; and the Federal Protective Service and the Federal
Computer Incident Response Capability at the General Services Administration.
The resulting department would have an initial budget of $37 billion and
170,000 employees, making it bigger than all other agencies besides the
departments of Defense and Veterans Affairs. It would pool the missions and
resources of dozens of agencies that currently have responsibility for
aspects of homeland security. For example, the department would combine the
port security duties of the Coast Guard, Customs, APHIS, and INS under one
roof.
These agencies would be organized into four broad operating divisions
designed to combine missions and resources that are currently scattered
across government. The Coast Guard, TSA, Customs, INS, APHIS and the
Federal Protective Service would form a border and transportation security
division. An emergency preparedness and response division would include
FEMA and offices from Justice and HHS. The Critical Infrastructure
Assurance Office, and National Infrastructure Protection Center would form
an Information Analysis and Infrastructure Protection division. This
division would also receive intelligence from the CIA and FBI and provide a
central place for the analysis of terrorism threats.
A final division focused on chemical, biological, radiological, and nuclear
countermeasures would pool the research activities of labs such as the
Energy Department's Lawrence Livermore National Laboratory and the Plum
Island Animal Disease Center, now located in the Agriculture Department.
Only the Coast Guard and the Secret Service would retain their independent
identities under this new structure, according to a Bush administration
briefing sheet on the proposal. Other agencies would be combined in various
ways. Customs and the INS, for example, would pool headquarters staff and
inspection duties at ports of entry.
No federal employees would be laid off in the process of creating the
department, according to the administration. But the White House argued for
giving the department's leaders much more authority over personnel than
most current federal managers have.
Affected agencies would continue to perform non-homeland security duties as
well. The Coast Guard, for example, would retain its search and rescue and
fisheries inspection missions, while Customs would continue to collect
import duties.
Under the reorganization, the White House Office of Homeland Security,
headed by former Pennsylvania Gov. Tom Ridge, would continue to exist.
Fleischer said Ridge "will be the one fighting for the creation of this
department," but refused to say whether he would be appointed to lead it.
Several members of Congress have proposed legislation to create a
Cabinet-level homeland security agency. Just last week, in an interview
with Government Executive and other National Journal Group publications,
Ridge said he would advise President Bush to veto any legislation that
would turn his office into a Cabinet department. Ridge said presidents are
"entitled to a few advisers" who owe their loyalty solely to the president.
"I believe that the president and future presidents always would be well
served having an adviser coordinating the actions among [the] multiple
agencies" charged with protecting homeland security, Ridge said. "I don't
think you get that if you are accountable to Congress."
Ridge, however, backed the idea of consolidating homeland security
operations currently spread among several agencies.
"We've got a lot of well-meaning people at these agencies that have a
homeland security function," he said. "They have responsibility, but the
lines of accountability are fuzzy. I think in the long term, when you align
responsibility and accountabilitywhen you reorganize ityou have an
opportunity to bring greater control, greater leadership, a better use of
the resources and ultimately you enhance your ability to prevent or respond
to a terrorist attack."
Administration officials are clearly concerned about potential problems in
winning support for the president's proposal within the agencies.
"Reorganizing the government is never easy," Fleischer said. "It involves
turf, it involves hardworking Americans who enjoy being in the agencies
that they're in who will have to adjust to change."
Headquarters for the new Department of Homeland Security might be located
outside of Washington, the White House indicated, to ensure continuity of
operations in the event of a terrorist attack on the nation's capitol.
Administration officials urged members of Congress to act on the proposal
before adjourning for the fall elections. The new agency could be up and
running by the start of next year.
*********************
Associated Press
Rowley Criticizes FBI Bureaucracy
Thu Jun 6,11:01 PM ET
By DAVID ESPO, AP Special Correspondent
WASHINGTON (AP) - The FBI (news - web sites) is weighed down by
bureaucracy, "make-work paperwork" and a culture that discourages
risk-taking, an agency whistle-blower told Congress on Thursday, venting
frustration with an organization she said could have done more to prevent
the Sept. 11 terrorist attacks.
"Seven to nine levels (of bureaucracy) is really ridiculous," Coleen
Rowley, a lawyer in the FBI's Minneapolis office, told a Senate Judiciary
Committee (news - web sites) hearing and a nationwide television audience.
Rowley appeared after FBI Director Robert S. Mueller suggested that
Congress expand surveillance powers that were put into law only seven
months ago, and said his storied agency needs to be "more flexible, agile
and mobile" if it is to prevent future terrorist attacks.
Mueller also disclosed it could take two or three years far longer than
the one year he originally hoped to bring FBI computer systems up to
standards needed to sift intelligence information efficiently.
The panel met as President Bush (news - web sites) outlined his latest
plans for strengthening America's defenses against terrorism. They included
creation of a new Department of Homeland Security, combining
responsibilities now scattered in several federal agencies including
customs, immigration, the Secret Service (news - web sites) and the Federal
Emergency Management Agency (news - web sites).
At the same time, members of the House and Senate intelligence committees
met in a guarded room in the Capitol to continue their own review of the
events of Sept. 11. Sen. Bob Graham (news, bio, voting record), D-Fla.,
said the session included a staff-led review of the growth of Osama bin
Laden (news - web sites)'s al-Qaida network and U.S. counterterrorism efforts.
While Mueller has appeared in public several times since the worst
terrorist attacks in the nation's history, Rowley was making her debut, a
veteran FBI attorney so unaccustomed to publicity that her prepared public
testimony contained lawyerly footnotes.
Praised by Sen. Charles Grassley (news, bio, voting record), R-Iowa, as a
patriot for stepping forward, she told lawmakers she would not talk about
the details of the case of Zacarias Moussaoui that prompted her explosive
letter last month. In a 13-page memo, the FBI agent accused bureau
headquarters of putting roadblocks in the way of Minneapolis field agents
trying to investigate the foreign-born Moussaoui, who is charged with
conspiring with the hijackers in the attacks.
Instead, she focused her remarks on the frustrations of working in an
"ever-growing bureaucracy" that she said led to risk aversion, make-work
paperwork and so many layers of officials that effective decision-making
was impeded.
"We have a culture in the FBI that there's a certain pecking order and it's
pretty strong, and it's very rare that somebody picks up the phone and
calls a rank or two above themselves," Rowley said.
Last August, FBI agents in Minnesota arrested Moussaoui, a French citizen
of Moroccan descent, on an immigration violation after a flight school
instructor became suspicious of his desire to learn to fly a commercial jet.
FBI headquarters turned down the Minneapolis' office request to seek a
search warrant to examine Moussaoui's computer. After the Sept. 11 attacks,
the FBI got the warrant and found information related to jetliners and
crop-dusters on the computer hard drive, officials said. The government
grounded crop-dusting planes temporarily because of what it found.
In his turn in the witness chair, Mueller won praise from several senators
for his efforts to reform an agency that Sen. Charles Schumer (news, bio,
voting record), D-N.Y., described as hidebound. "You inherited a great
organization but also a great bureaucracy," added Sen. Mike DeWine (news,
bio, voting record), R-Ohio.
Even senators who were critical of Mueller at various points joined in the
praise.
At the same time, he faced sharp questioning about the FBI's failure to
alert the committee earlier this year about the so-called Phoenix
memorandum, a document sent to agency headquarters last summer noting that
several Arabs were suspiciously training at a U.S. aviation school in Arizona.
Sen. John Edwards (news, bio, voting record), D-N.C., asked Mueller why the
headquarters agent to whom the memo was addressed, David Frasca, had not
told the Judiciary Committee about it in January when Frasca met with the
panel's staff. Mueller said he did not know.
Sens. Jon Kyl, R-Ariz., and Schumer introduced a measure on Wednesday to
make it easier for agents to obtain wiretaps and conduct searches in
foreign intelligence cases, saying that if the FBI had been able to listen
in on Moussaoui it might have been able to prevent the attacks.
"This is a problem, and we're looking for solutions to address this
problem," Mueller replied, adding that the Justice Department (news - web
sites) would be issuing a formal opinion on the legislation in the future.
"We are looking at ways to tweak" the legislation passed by Congress late
last year, he added.
Mueller had previously outlined plans to reorganize the FBI to devote
greater resources to anti-terrorism, including its ability to analyze
available intelligence. "This Congress is all too familiar with the FBI's
analytical shortcomings," he said. "Building subject area expertise or
developing an awareness of the potential value of an isolated piece of
information does not occur overnight," he said. "It is developed over time."
He told one senator the agency had begun hiring additional translators
skilled in Farsi, Pashto and other languages, and said the FBI now has the
ability to translate intercepts "in real time" in terrorism cases.
At the same time, he told seemingly incredulous senators that computer
technology at the agency didn't allow an agent to search all existing
electronic reports for a key phrase the term "flight school," for example.
Asked time after time whether Rowley's letter or the Phoenix memo could
have prevented the disastrous attacks, he sidestepped.
"I'm hesitant to speculate as to what would have happened if, ..." he said
at one point.
***********************
Federal Computer Week
TSA plans two smart card pilot projects
The Transportation Security Administration plans to launch at least two
pilot projects this year for a smart card program that eventually will put
the identification technology into the hands of 10 million to 15 million
workers, a transportation official said June 5.
"Our vision is to have one credential a transportation worker will wear,"
said Gregg Hawrylko, program manager for the Transportation Department's
Credential Project Office. "We're hoping to simplify the process and raise
the bar on security."
The cards will provide secure access to buildings and computer networks and
will hold biometrics, most likely in the form of fingerprints, Hawrylko
said at the Smart Card Alliance's conference this week in Washington, D.C.
TSA will maintain a central index of basic employee information that could
include name, biometric template, security level and areas of access. "We
will store as little as possible to handle privacy concerns," he said.
The agency will make its procurements through the General Services
Administration's Smart Access Common ID contract but will soon release an
announcement soliciting ideas from all vendors, he said.
Working groups are finalizing issues related to the cards, such as design,
identity documentation, requirements, policy and a cost-sharing strategy.
The pilot projects could be focused around major airline hubs or seaports,
he said.
"Funding will dictate how quickly we can run," a transportation official
said, but the program could go agencywide within three years.
Congress has criticized the fledgling TSA's spending and has yet to
determine its budget for fiscal 2003. The Bush administration is asking for
$4.8 billion.
In the near-term, TSA will set the policy for trusted traveler cards for
frequent airline passengers. However, John Magaw, Transportation
undersecretary for security, has said that there is no card that will allow
people to get through security completely, Hawrylko noted.
The trusted traveler cards could be developed in tandem with the smart
cards and will use the same architecture.
TSA is coordinating its effort with the Federal Aviation Administration,
which is moving forward with its own smart card pilot project.
"They're just running a little bit faster than us," the transportation
official said. "We're looking forward to finding out what lessons they
learned."
Both agencies will align their programs with GSA-developed smart card
interoperability specifications.
A top priority is ensuring interoperability throughout DOT, Dan Mehan, the
FAA's chief information officer, said May 22 at the E-Security and Homeland
Defense conference in New York City.
The Aviation and Transportation Security Act, signed in the wake of the
Sept. 11 terrorist attacks, requires the department to develop a universal
worker identification system.
**********************
Government Computer News
DOD looks closer at promising technologies
By Dawn S. Onley
Nearly eight months after it released a request to industry for help
developing technologies to combat terrorism, the Defense Department will
now take the next step.
Members of the multiagency Technology Support Working Group have been
sifting through more than 12,500 responses and has identified 600 proposals
it considered promising. The group asked the companies that submitted them
to create white papers on their proposals and expand on details, including
costs.
"We are now at a point where we are trying to ask for specific numbers and
move on some of those ideas," said Deidre A. Lee, director of Defense
procurement.
During this phase, ideas will be more closely scrutinized to see if they
are feasible, said Air Force Lt. Col. Mike Halbig, a Defense spokesman. As
the white papers come in, the working group will narrow the pool further.
Defense officials have asked for technologies that will prevent and combat
terrorism, attack difficult targets, conduct protracted operations in
remote areas and develop countermeasures to weapons of mass destruction.
Pete Aldridge, Defense undersecretary for acquisition, technology and
logistics, and head of the working group, asked for new products and
applications that could be fielded within 12 to 18 months.
The chosen ideas for which the group sought white papers included:
a system that, using an integrated database and data mining tools, could
identify patterns and trends of terrorist groups and predict their behavior
a portable polygraph machine to conduct impromptu interviews
a screening system with integrated sensors to alert officials of someone
carrying chemical or radiological weapons.
"We received an incredible outpouring of interest from all over the globe,"
Halbig said.
The working group is made up of 80 federal agencies including DOD, the
Environmental Protection Agency, General Services Administration, Federal
Aviation Administration and Energy Department.
************************
Los Angeles Times
PUC Introduces 'Bill of Rights' for Phone Users
Telecom: The proposal would set tougher standards for all carriers,
covering privacy, billing, disclosure, other issues.
By ELIZABETH DOUGLASS
Hoping to relieve frustrated phone customers and rein in consumer abuses,
state regulators Thursday unveiled a "Telecommunications Consumer Bill of
Rights" containing tougher minimum standards for wired and wireless
carriers in California.
The new rules, more than two years in the making, are designed to address
mounting complaints from customers about billing problems, customer
service, misleading sales pitches and other ills.
Existing rules governing phone companies are inadequate, cryptic and buried
in indecipherable government filings, said consumer groups and Carl Wood, a
member of the California Public Utilities Commission and the driving force
behind the regulatory overhaul. Wood's proposal sets--for the first
time--minimum standards for phone companies in the state and applies them
to all carriers, including long-distance, local, prepaid phone card and
mobile-phone service providers.
"I think this is a huge deal," said Michael Shames, executive director of
the Utility Consumers' Reform Network, a San Diego-based consumer group.
"From the consumer point of view, creating a comprehensive set of
guidelines for telecommunications is about eight years overdue."
The proposed telecommunications rules would require carriers to:
* Fully disclose all relevant rates, terms and conditions of service in
clear language and in readable type size.
* Protect consumer records and personal information from misuse and
unauthorized disclosure.
* Provide accurate and understandable bills that clearly label products,
services, fees and the names of carriers providing the services, and
provide prompt and fair redress for billing problems.
* Treat all similarly situated customers equally, free of prejudice or
disadvantage.
In addition, the rules would require the PUC to promote consumer
participation in rule making and public policy matters that affect them,
and to provide effective recourse to consumers if their rights are violated.
The rules would apply to all carriers in California with more than $10
million in annual revenue and would protect residential and small-business
customers. The PUC would enforce the measures and could levy fines of
$5,000 to $25,000 for each violation, Wood said.
SBC Pacific Bell, the largest local phone company in California, said it
supports the proposal by Wood.
"Having rules that treat all the companies in the industry the same ... we
think that's good for consumers," SBC spokesman John Britton said.
"Undoubtedly there will be a couple of areas we will want to discuss with
the commission, but we think he's expressed some good ideas today."
The wireless industry, however, is expected to raise strenuous objections.
"I am fairly sure that we will get a lot of resistance from the mobile
carriers, which enjoys exemptions from a lot of regulations that everybody
else faces," Wood said.
But he pointed out that wireless phone service is playing a larger role in
day-to-day phone use and is generating record numbers of complaints at the PUC.
Susan Pedersen, executive director of the Cellular Carriers Assn. of
California, declined to comment on Wood's proposal.
"We're not in a position to comment right now, but we will be looking at
the [rules] and following up with the commission," Pedersen said.
The rules are preliminary and need approval from the full commission.
After a 20-day period for the affected companies and others to comment on
the proposal, Wood hopes to put the rules to a vote as early as Aug. 8.
*********************
Federal Computer Week
Pa. creates cybercrime task force
Pennsylvania's state police department has created the first of several
planned regional task forces to fight the rising tide of computer crimes.
The first task force will be based in Embreeville, Pa., and will cover 11
counties in south-central and southeast Pennsylvania, sharing information
with district attorneys offices and local law enforcement agencies as well
as other state and federal agencies, said Trooper Linette Quinn.
Funded through a $250,000 grant from the Pennsylvania Commission on Crime
and Delinquency, the task force will include representatives from local
police departments and state and federal law enforcement groups who will be
trained and given equipment, such as computers and wireless phones, Quinn said.
The commonwealth has a computer crime unit within its criminal
investigative bureau, and some local law enforcement agencies have similar
units, Quinn said. But the formation of the regional task force will help
agencies pool resources and share information more effectively as the
cybercrime problem gets worse, she said.
In the past 15 months, the commonwealth has investigated 705 "traditional"
computer crimes such as fraud, identity theft and child pornography and
558 "technical" crimes, including hacking and unauthorized access to a
computer, Quinn said.
"It's becoming more prevalent," she said.
********************
Los Angeles Times
Online Movie Site Closed Down
By JON HEALEY
TIMES STAFF WRITER
June 7 2002
Dutch authorities Thursday took down Film88.com, a renegade online movie
site, by persuading an Internet provider in Holland to pull the plug on the
company's digital film library.
Film88.com offered viewers an online movie theater showing hit films on
demand for $1, but it did so without paying or obtaining permission from
the studios. Although the company said it operated out of Iran, which
doesn't recognize foreign copyrights, its computerized film library was
housed in Holland, said Tim Kuik, managing director of BREIN, a Dutch
anti-piracy foundation.
The founders of Film88.com had tried a similar venture, Movie88.com, using
computers located in Taiwan. But authorities in that country shut down the
service and seized its computers in February in response to complaints from
the studios. The latest venture had an even shorter run. The site's
operators announced their arrival on Tuesday, and within two days
Film88.com was offline.
The action demonstrates how quickly Hollywood can respond to piracy in
countries that support international copyright treaties. Although the
enforcement mechanisms vary from country to country, many nations require
Internet providers to cut off infringing customers or risk being held
liable themselves.
Kuik said his group acted in response to a request by the Motion Picture
Assn., the international trade group representing the major Hollywood
studios. Although the Film88 Web address is based in Iran, it apparently
used a Dutch Internet provider, TrueServer, to store its movies and provide
the large amount of bandwidth needed to display movies in near-VHS quality.
"The MPA understands that Internet piracy is a global phenomenon," said
Mark Litvack, the association's director of legal affairs and worldwide
anti-piracy efforts. "Both in terms of our investigative and our legal
facilities, we are prepared ... to deal with it on a global scope."
The investigations into Film88.com and Movie88.com are continuing. On its
Web site, Film88.com said only that it was facing a "technical
proxy/caching problem" and promised to be back online as soon as possible.
If it does come back, Litvack said, the MPA will act again.
*****************
MSNBC
File-sharing sites try to go legit
Popular P2P services seek more copyright content, revenues
By Jane Weaver
June 6 As the recording industry turns up the legal heat on services that
allow pirated music downloads, the popular peer-to-peer networks like
Grokster and KaZaa are scrambling for ways to profit from the millions of
Internet surfers who download files from their sites.
GROKSTER ANNOUNCED THURSDAY that it had formed a partnership with
software company FileFreedom that would allow independent musicians and
artists to target potential customers at the file-sharing site.
The high-profile Grokster is one of several online file-sharing
networks facing lawsuits from the Recording Industry Association of America
for allowing people to download pirated songs.
The race to go legit is on as the online peer-to-peer networks
(P2P) struggle to avoid Napster's fate. The record industry blames illegal
music downloading for the decline in CD sales and has sought to cripple the
numerous file-sharing sites which sprung up in the wake of Napster's
shutdown last year.
Earlier this week the RIAA said that it would expand the lawsuit
against Grokster, MusicCity's Morpheus and KaZaa to include key figures
behind the popular KaZaa service.
Since Napster's demise, the online file-sharing sites have built up
vast communities of people eager to download songs, pirated copies of new
movie releases and adult content. Within nine days of its release,
"Spider-Man" became the most popular movie downloaded from KaZaa, according
to Redshift Research, a Belmont, Mass. firm that follows the peer-to-peer
industry.
At the same time, the file-sharing sites are trying to be known as
places where independent creative artists can distribute their works, a
strategy calculated to help them stay alive if the U.S. courts rule against
them.
"I'm not saying they're going to succeed," said P.J. McNealy,
digital music analyst with Gartner's G2. "But there are continued efforts
to find a legitimate model for P2P."
TARGETING THE INDIES
The Grokster deal with FileFreedom, a Charlottesville, Va.,
advertising technology firm that develops personalization and community
features for P2P networks, is a step in that direction.
Using the FileFreedom technology copyright owners be they software
developers, photographers or musicians would pay Grokster about $10 to
register content. They would then be able to market the work to Grokster
users based on age, gender, zip code and personal tastes.
The content owner could offer a targeted user a free download, sell
merchandise or promote live appearances via e-mail.
"We expect that a lot of small independent record labels will take
advantage of it, as well as independent musicians, authors, filmmakers and
game developers" said Grokster spokesman Henry Wilson. "We are anticipating
that it will add revenues, but, more importantly, it will enable
independent artists to effectively promote and distribute their creative
work."
"It's a way to bring authorized content into the file-sharing
system," said Wayne Rosso, marketing executive at FileFreedom.
It's also a way to bring more revenue the latest move by
file-swapping networks to try to profit from the millions of users
downloading songs and videos. Almost all of the P2P networks piggyback ad
software, called "adware" or "spyware" into their programs. The result is
users who download their technology can be tracked as they surf the Web or
be hit with pop-up advertisements when they visit certain sites.
For example, in a revenue-sharing deal with Brilliant Digital, Kazaa
has integrated the Los Angeles software firm's 3D interface called "Altnet
Secure" into its file-sharing program. Beginning in July, whenever users
search for music files on KaZaa, there will be ad-sponsored links in the
search which would offer paid downloads along with free ones.
"There is a very big move afoot to come up with some way to
monetize these big networks," said Matt Bailey, an analyst with Redshift
Research. "People are trying to make the P2P services legitimate or to come
up with some sort of real business model."
POPULARITY DRAWS ADS
At the same time, KaZaa and other file-sharing services like
BearShare and MusicCity have been trying to grow their advertising revenues
by signing deals with online ad-serving firms such as DoubleClick,
FastClick and 24/7 Media.
Many of the ads at the P2P sites are sold for only a few cents per
impression (an impression is counted when someone visits a page featuring
an ad), but the impressions add up quickly. KaZaa, one of the largest
file-sharing sites, has on average 1.5 million people logged on
simultaneously, according to Redshift Research. Grokster recently
registered 3 million downloads a day and in May had 1 million unique users,
according to spokesman Wilson.
"There's relatively good advertising performance across the board
for the P2Ps," said Jeff Hirsch, sales and marketing executive at
FastClick, citing the sites' "phenomenal amount of traffic volume." Asked
for specific numbers, Hirsch would only say that FastClick works with "a
number" of P2P networks, and he declined to estimate how much revenue is
generated by them or how many advertising impressions are viewed by users
each month.
Although there's no reliable information on how big the ad market
is for the P2P networks, it's rumored that some of the sites earn several
million dollars a month each from selling billions of ad impressions to
marketers.
Yet as long as they carry legally questionable content, advertising
analysts say the file-sharing sites will have a tough time attracting
interest from mainstream marketers. Furthermore, even some online
advertising firms that count the P2P networks among their clients decline
comment about them. FastClick's Hirsch did say that "if a site is doing
anything that's not legal they would not be on our network."
Bailey, the Redshift Research analyst, said he feels there's only a
"limited market" for Grokster's targeted service, but that the P2P networks
could find significant revenue from adult content companies.
"The producers of adult content are keen on the idea of promoting
their content through P2P services," said Bailey. "That is more of an
online marketplace than music."
********************
Washington Post
Copyfight Renewal -- Owners of Digital Devices Sue to Assert the Right to
Record
By Mike Musgrove
Looking at how Hollywood has been trying to protect itself from piracy, the
cure would seem to be simple: Just change nearly everything about how
consumer electronics work.
While shoppers clamor for CD burners, MP3 players and digital video
recorders, movie studios and record labels have been urging consumer
electronics makers and software developers to alter these devices to keep
movies, TV shows and records from being duplicated across the Internet.
Studios and labels have also asked Congress to pass laws requiring
manufacturers to put locks on these and other gadgets that would stop
unauthorized copies.
This conflict is shaping up to be one of the tech-policy battlegrounds of
the year, as consumers, manufacturers and entertainment companies keep
butting heads, sometimes winding up in court as a result.
Yesterday, the Electronic Frontier Foundation filed suit on behalf of five
owners of ReplayTV personal video recorders against a lineup of
entertainment companies in U.S. District Court in Los Angeles. The suit
asks the court to rule that owners of these digital recorders, which store
TV broadcasts on internal hard drives, have the right to record shows, skip
commercials and move recorded content to other devices. It also asks the
court to forbid SonicBlue Inc. from downgrading the capability of ReplayTV
boxes it has already sold.
The entertainment industry defendants in that case filed their own suit
against ReplayTV in the same court last October. They alleged that Replay's
products infringe on their copyrights by automatically stripping ads from
recordings, then letting users share those ad-free copies with other Replay
owners.
These cases, and most other copyright conflicts, hinge on the idea of "fair
use" -- the concept that copyright holders' control over their work must
allow exceptions for some noncommercial uses. But the fair-use rights of
consumers have never been codified.
That wasn't particularly necessary in the pre-digital age, because the
copying technology available then had built-in limits. A videotaped copy of
a videotaped copy of "The Osbournes," after all, looks noticeably fuzzier.
But digital gadgets such as a ReplayTV recorder could enable consumers to
make and distribute unlimited, perfect copies of MTV's hit series.
ReplayTV boxes are not programmed to differentiate fair-use copying and
piracy. And while buyers of these recorders may have assumed they have the
right to skip commercials or watch shows whenever and wherever they want
to, some broadcasters say the rules need to be changed for digital recordings.
Turner Broadcasting CEO Jamie Kellner recently created a stir when he told
Cableworld magazine that Replay and TiVo owners who skip commercials are
breaking an implicit contract between network broadcasters and viewers. As
such, they're stealing programming by leaving networks no way to cover
their costs.
From that point of view, the consumer electronics industry is building a
nation of thieves.
The controversies surrounding personal video recorders apply in some way or
other to just about every other new class of digital gadget used for
playing or recording copyrighted content.
And those are precisely the gadgets that have remained popular during the
economic downturn. For instance, computer sales have stalled, but sales of
MP3 digital-music players will increase 32 percent this year over 2001,
according to the Consumer Electronics Association. Both Apple and Gateway
have based ad campaigns on the popularity of digital music.
Hollywood's fear is that the real use for all this digital technology is
piracy, and it's desperate to avoid another Napster experience.
"We need to get a reasonably secure environment before 50 million Americans
get used to downloading their movies for free," said Preston Padden,
executive vice president at Walt Disney Co.
The entertainment industry has backed a bill introduced by Sen. Ernest F.
Hollings (D-S.C.) that would require all computers and nearly all
electronic devices to come with software or hardware that would stop
consumers from making unauthorized copies of copyrighted material.
No program or circuit that would do this has been proven to work yet, and
tech companies have been quick and adamant in warning that such a bill
would result in products that nobody wants to buy -- if not an outright end
to technological innovation.
"The bill is so restrictive and so absurd, it's hard to believe how an
electronics industry would exist" if it passed, said Andy Wolfe, the chief
technology officer of SonicBlue. The company makes not only the ReplayTV
recorders named in the October suit but also Rio MP3 players -- the target
of an earlier, unsuccessful suit by the recording industry.
Attempts to bring manufacturers and entertainment firms together to develop
broad copy-protection standards have yet to get very far. The Secure
Digital Music Initiative, a project led by major record labels to stop
online music sharing, ground to a halt after two years of work. On Monday,
representatives of movie studios and consumer electronics manufacturers,
who were supposed to issue a report on how to protect digital-television
broadcasts from Internet piracy, could only agree on the basic outlines of
any technological solution.
If manufacturers can find ways to put restrictions on the next wave of MP3
players or DVD recorders, they may face yet another problem: Nearly every
time a new copy-protection technology comes along, hackers break it.
One of the few products of the Secure Digital Music Initiative, for
instance, was a system of "watermarks" on CDs that would contain
copy-protection instructions for future digital recorders would detect and
follow. Soon after the proposed technology was posted on the Web in the
fall of 2000, a team of computer scientists stripped the sample audio clip
of its protective watermark.
More recently, Sony Music tried using copy-prevention technology on audio
CD releases in Europe that made them unplayable and uncopyable on
computers. The word soon spread of a low-cost way to defeat this layer of
protection: Take a black magic marker to part of the CD's underside.
Computer security experts say this problem will always exist.
"You're trying to make water not wet," said Bruce Schneier, founder and
chief technology officer of Counterpane Internet Security Inc. "The natural
law of cyberspace is that bits are copyable."
The software industry has its own experience with this. "We've had to
grapple with this problem for years," said Robert Holleyman, president and
chief executive officer of the Business Software Alliance, a trade group
that lobbies for the prosecution of software pirates.
According to the BSA, the software industry loses $11 billion a year to
software pirates. "If there was a single, one-size-fits-all solution to
this problem, we'd be all for it," said Holleyman.
**********************
Associated Press
Man Remains Jailed Over Web Postings
Thu Jun 6, 2:36 PM ET
SEATTLE (AP) - A 70-year-old man has been in jail for more than three
months for refusing to delete from his Web site addresses and other
personal data of employees at the retirement home that evicted him.
The jailing of Paul Trummel, a native of England who moved to the United
States in 1985, has drawn fire from national and international writers
groups that support his First Amendment claims.
"Our concern is that he's being punished for speech on the Internet that
should be protected," said Lucy Dalglish, executive director of the
Reporters Committee for Freedom of the Press in Washington, D.C.
Other groups that have questioned the jailing include the National Union of
Journalists in London and Reporters Sans Frontieres of France.
Trummel was jailed indefinitely on Feb. 27 for violating an anti-harassment
order by King County Superior Court Judge James A. Doerty. Doerty ruled in
April 2001 that Trummel had been abusive and stalked residents and
administrators at Council House, a low-income retirement home in Seattle.
Doerty ordered Trummel to remove from his Web site the home phone numbers,
addresses and other personal data on employees at Council House, and
imposed fines of $100 a day for failing to comply.
Trummel also was ordered to remove a picture making administrator Stephen
Mitchell resemble Osama bin Laden (news - web sites).
Council House managers and some residents say Trummel is delusional,
obsessive and inflammatory. He was evicted last year, partly because of his
Web site and newsletter Disconnections, a takeoff on the center's official
publication, Connections.
Last week Doerty limited Trummel's phone privileges, saying he was still
harassing residents and staff members, and he was placed in solitary
confinement. His incarceration is set for court review June 17.
********************
New York Times
Security Hole Found in KaZaA File-Sharing Service
Users of KaZaA, a popular Internet service for sharing music files,
frequently expose personal files on their computers by misconfiguring the
program, according to a study by two researchers at HP Labs.
The study, which was published on Hewlett-Packard's Web site on Wednesday,
reveals that the peer-to-peer programs, which are wildly popular for
sharing music files, software and, increasingly, video files, can also pose
a serious threat to computer privacy. KaZaA, a product of Sharman Networks,
is currently the most widely used of the services. It is used by an average
of two million people at any time.
The researchers, Nathaniel S. Good, a computer scientist at the Information
Dynamics Lab at HP Labs, which is Hewlett-Packard's central research
organization, and Aaron J. Krekelberg, a computer scientist at the
University of Minnesota, found that a significant percentage of KaZaA users
have accidentally or unknowingly allowed private files like e-mail and
financial documents to be shared with the global Internet.
The researchers said the flaw exposed a basic vulnerability that had been
frequently ignored by advanced computer security researchers. "You can have
the most secure network in the world," Mr. Good said, "but if it's prone to
user errors it will undermine the basic security of the system."
The paper raised the second damaging privacy issue that has confronted
KaZaA's file-sharing service recently. In April, the KaZaA network faced
criticism when it was disclosed that its free file-sharing program included
a second program that could make its users participants in a paid
file-sharing network.
Critics said the inclusion of the additional program had not been
disclosed, and some referred to it as "sneakware." The company responded by
saying it would not activate any network without users' permission, and
noted that people would still be able to exchange files for free.
Mr. Good said he had discovered the new security flaw while setting up the
computer of a friend who was a computer novice. "I realized he was sharing
everything on his hard disk," he said.
Initially he assumed that the KaZaA software developers would quickly
correct the problem. However, several months later he found that the
problem had grown worse.
The two researchers began to run automated programs that would use the
KaZaA software to search for files that store mail for the Microsoft
Outlook Express electronic mail program. They assumed that no KaZaA user
would intentionally share this kind of a file.
A total of 443 searches during a 12- hour period revealed that
unintentional file sharing is common on the KaZaA network: 61 percent of
the searches performed in the test found at least one electronic mail file.
By the end of the 12-hour period the researchers had identified 156 users
whose e-mail files were public.
Mr. Good said the researchers did not download the files for fear of
violating computer crime laws.
The researchers were also able to determine cases in which users exposed
word processing and financial software files, as well as the cache showing
what Web sites they had visited. The Hewlett-Packard researchers, who are
experts in the area of computer usability, said they found shortcomings in
the KaZaA software that made it easy for users to configure their software
improperly and unknowingly share private information.
The researchers performed a simple usability study and discovered only 2 of
their 12 research subjects who were experienced computer users were able
to determine correctly which folders and files should be shared.
A spokeswoman for KaZaA, Kelly Larabee, said the company was investigating
the flaws raised in the Hewlett-Packard paper.
"At minimum, we will enhance our efforts to educate users about protecting
their data and using shared folders only for material they choose to
share," she said.
********************
Los Angeles Times
Reeled In by a Spoof, Chinese Daily Shrugs Off Its Capitol Error
By HENRY CHU
BEIJING -- A gaffe by China's usually staid state-run media has left a
popular newspaper here with onion on its face.
Readers of the Beijing Evening News, one of the capital's
largest-circulation newspapers, learned this week that the U.S. Congress
had threatened to move out of Washington unless a fancy new Capitol was built.
"Don't get us wrong. We actually love the dilapidated [old] building,"
House Speaker J. Dennis Hastert (R-Ill.) was quoted as saying. "But the
cruel reality is, it's no longer suitable for use by a world-class
legislature. Its contours are ugly, there's no room to maneuver, there
aren't enough bathrooms, and let's not even talk about the parking."
If a new building wasn't erected, the article said, lawmakers were prepared
to pack up and move to Memphis, Tenn., or Charlotte, N.C.
The story seems newsworthy enough. Trouble is, it was lifted straight from
the Onion, a satirical "news" publication based in New York that has caused
countless American readers to double over with laughter at its weekly
spoofs on current events.
Its story on the Capitol appeared in its May 29 edition, alongside such
headlines as "Sexual Tension Between Arafat, Sharon Reaches Breaking Point"
and "Man Blames Hangover on Everything But How Much He Drank."
A writer for the Beijing Evening News apparently picked up the item from
the Internet, reworked the opening paragraphs and submitted it to his
editors, who then published it Monday as a news story, without citing a source.
Nobody, perhaps not even the reporter, appeared to realize that it was a joke.
Yu Bin, the editor in charge of international news, acknowledged Thursday
that he had no idea where the writer, Huang Ke, originally got the story.
Yu said he would tell Huang to "be more careful next time."
But he adamantly ruled out a correction and grew slightly obstreperous when
pressed to comment on the article's total lack of truth.
"How do you know whether or not we checked the source before we published
the story?" Yu demanded in a phone interview. "How can you prove it's not
correct? Is it incorrect just because you say it is?"
For the record, John Feehery, Hastert's spokesman, said the congressman
never made the remarks attributed to him.
"He likes the Capitol just fine," Feehery said.
However, the office of House Minority Leader Richard A. Gephardt (D-Mo.)
did not respond to a request Thursday for comment. Gephardt was alleged to
have said, "Look at the British Parliament. Look at the Vatican.... Without
modern facilities, they've been having big problems attracting top talent."
The Onion parody featured an architect's rendering of a proposed futuristic
Capitol complete with a retractable dome, a "Dancing Waters fountain" and
"55 more luxury boxes than the current building." The Beijing paper
reproduced the entire illustration without crediting the Onion. There
wasn't even a caption explaining what the drawing was.
Robert Siegel, editor in chief of the Onion, which prides itself as
"America's finest news source," said he was amazed at the Chinese paper's
gullibility.
"Wow, even journalists now believe everything they read," Siegel said from
his home in New York. "If I were a reporter in Beijing and found an item
like that ... I might want to follow up and check my sources. Readers fall
for that kind of thing all the time, and maybe I was naive, but I thought
reporters would be smarter."
That the Beijing Evening News cribbed the Onion article is actually not so
surprising in a land where movies, pop albums and books are pirated and
sold on the streets.
Though still under the thumb of the government, the media in China have
become more freewheeling and more competitive, forced to duke it out for
market share and turn a profit.
The Beijing Evening News, which boasts a circulation of about 1 million, is
fighting off challenges from a raft of other newspapers and magazines.
Many papers now rely on contract freelancers to provide all sorts of
content. This has given rise to a slew of young, Internet-savvy,
English-speaking writers who freely lift stuff from the Web and submit it
to editors who adopt a "don't ask, don't tell" attitude toward the
material's origins.
One man who used to contribute pieces to a financial publication--he asked
not to be identified--said he would simply take copy from British and U.S.
news services and translate it into Chinese.
Huang, the author of the Beijing Evening News article on the unloved U.S.
Capitol, couldn't be reached for comment Thursday.
He or she--the name is androgynous and very likely a pseudonym--appears not
to be one of the paper's longtime contributors. An electronic archive
search on the paper's Web site yielded Huang's byline on only two stories
in the last two years.
Both appeared in Monday's edition. One was the Onion rip-off. The other, on
the same page, was an investigative piece about the lack of security
screening for most private charter flights in the U.S.
But a little checking showed that this story too was cribbed: It was a
direct translation of a front-page article from Sunday's Washington Post.
********************
Washington Post
Forman Pushes E-gov into Homeland Security Arena
Nick Wakeman
Washington Technology
Thursday, June 6, 2002; 4:36 PM
The Bush administration is working on e-gov-related homeland security
initiatives that will concentrate on architecture and on beginning pilot
projects that can push information integration.
The idea of information integration goes beyond sharing information to
getting information systems to work together to glean intelligence from
various databases, said Mark Forman, the e-gov point man at the Office of
Management and Budget, said June 5 at the Federation of Government
Information Processing Councils' conference in New Orleans.
Forman said he and Steve Cooper, the chief information officer of the
Office of Homeland Security, are working together on identifying projects.
The architecture or foundation projects will look at the processes needed
for sharing and analyzing information across agencies and between state,
local and federal agencies, Forman said.
The pilot projects will focus on known gaps in systems and processes and on
deploying a solution to address the gap in 60 to 120 days, he said. The
pilots should be identified by the end of the fiscal year.
Forman and Cooper also are working on the information-sharing strategy that
will be part of the homeland security strategy to be released by Tom Ridge
in early July. The goal of the information sharing strategy will be to
improve response time and to improve the quality of decision-making, Forman
said.
The challenge is a great one, he said. "In some cases, the cycle time for
decisions has to drop down to minutes or hours, and we just aren't used to
that," Forman said. "Doing architecture analysis is hard. It is not just
improving processes, but defining the processes."
*******************
Washington Post
VeriSign Slapped With Third Lawsuit Over Marketing
Reuters
Thursday, June 6, 2002; 4:58 PM
SAN FRANCISCODomain name registrar Go Daddy Software Inc. said Thursday it
is suing VeriSign Inc. , the fourth complaint against the market leader for
allegedly deceiving rivals' customers into transferring their business.
The latest lawsuit, filed Wednesday in federal court in Phoenix, accuses
VeriSign of false and deceptive advertising, interference with customer
relationships, misappropriation of trade secrets and consumer fraud,
according to Scottsdale, Arizona-based Go Daddy.
At issue are letters VeriSign is sending to people labeled "Domain Name
Expiration Notices" that urge recipients to return the forms, along with
$29 per domain, or risk losing their domains, Go Daddy said.
However, the "reply by" dates on the forms have no correlation to the
expiration of the domains, Go Daddy said. Customers who replied to the
forms were paying $29 instead of $8.95 per domain they had been paying to
Go Daddy, the company added.
The non-profit California Consumer Action Network asked a court in San
Diego to stop VeriSign's direct marketing campaign in late March.
After BulkRegister filed a lawsuit in May, a Maryland judge ordered
VeriSign to stop sending the letters to BulkRegister customers.
Later that month, a Los Angeles law firm filed its own lawsuit against
VeriSign seeking class action status.
A VeriSign spokesman said the Mountain View, California-based company does
not comment on ongoing litigation.
The company also faces a handful of lawsuits seeking class action status
that accuse the company of inflating its stock price and misleading
investors about organic revenue growth.
*********************
Los Angeles Times
Liberties Group Sues Studios Over Consumers' Use of Digital Devices
By JON HEALEY
TIMES STAFF WRITER
June 7 2002
A civil-liberties group sued the major Hollywood studios and television
networks Thursday in a bid to define consumers' TV-recording rights for the
digital age.
In a complaint filed in U.S. District Court in Los Angeles, the Electronic
Frontier Foundation asked a federal judge to declare that consumers can use
digital recorders to watch shows after they are broadcast, skip all
commercials, transmit recordings to members of their households and send
copies of free TV broadcasts to anyone on the Internet as long as they are
not compensated.
The complaint is a counterpunch to a copyright-infringement lawsuit that 28
studios and networks filed against Sonicblue Inc. and its latest digital
video recorder, the ReplayTV 4000. In fact, the foundation wants the two
cases merged. Like other manufacturers' "personal video recorders," the
ReplayTV 4000 stores TV programs on a hard drive instead of videotape.
Unlike its competitors, however, the ReplayTV 4000 can skip commercials
automatically when playing back a show, and it can beam shows to other
ReplayTV 4000s--two features that enable users to violate copyrights, the
entertainment companies say.
Lawyers for the Electronic Frontier Foundation, which focuses on consumer
rights in cyberspace, accused the entertainment industry of using the
Sonicblue lawsuit to mount an indirect attack on consumers. To win their
case, the entertainment companies must prove that consumers don't have the
right to skip commercials or shift copies of their recordings to other
devices, said Fred von Lohmann, the foundation's senior intellectual
property attorney.
Consumers "should at least have the right to stand up in court and defend
their own activities," he said.
Representatives of the studios and networks said the foundation's action
distorted the nature of their lawsuit against Sonicblue.
"We have never indicated any desire or intent to bring legal action against
individual consumers for use of this device," the companies said in a joint
statement.
Lawyer Robert M. Schwartz, a partner at O'Melveny & Myers who represents
the studios, said: "We will show to the court that this device is designed
to directly infringe our copyrights and do other things that aren't fair
use. We don't have to show that individual users are acting improperly."
The foundation brought its lawsuit on behalf of five ReplayTV 4000 owners
who say they use their recorders to limit the commercials their children
see, move recordings around their home and even send shows to their
laptops--a feature not designed or supported by Sonicblue.
Legal experts said the complaint would not move forward unless the five
consumers can show they were at imminent risk of being sued by the studios
and networks for copyright infringement.
Lawyers for the foundation said they were simply trying to ensure that
consumers could use digital recorders to do things they had grown
accustomed to doing with their VCRs. But other copyright lawyers said the
legal waters were not that clear, particularly when it comes to sending
copies of shows from device to device.
In a landmark 1984 opinion, the Supreme Court rejected the studios' legal
challenge to Sony Corp.'s Betamax VCR and ruled that consumers could record
programs for later viewing. But the case did not consider whether consumers
could copy a program and send it over the Internet, said J.D. Harriman, a
copyright attorney at Coudert Bros. in Los Angeles.
Nor have the courts addressed whether consumers have the right to skip
commercials. But Maureen Dorney, a partner at the law firm Gray Cary in
Palo Alto, said the studios would be hard pressed to prove consumers were
"doing something wrongful because they get up and go to the bathroom."
"It's not about the rights of consumers; it's about the unlawful conduct of
the manufacturer of this box," Schwartz responded. "The manufacturer of
this box does not have the right to sell a device that electronically and
instantly bypasses the commercials."
Even if the foundation's complaint is thrown out, observers agreed, the
Sonicblue case could influence what consumers can do with the new digital
recorders.
"This case has the potential for making some important law," Dorney said.
*******************
Government Computer News
New department could reshape federal data sharing
By William Jackson
GCN Staff
The president's proposed Homeland Security Department could set new rules
for interagency information sharing, speakers said today at a hearing of
the House Government Reform Subcommittee on Technology and Procurement Policy.
The need to share information more efficiently has become a centerpiece of
the administration's quest for homeland security. Agency officials
testifying today cited the lack of clearly defined IT requirements as a key
barrier to sharing information. Agencies and the administration have been
criticized because so many details about the Sept. 11 terrorists and their
plans were never brought together to form a clear picture.
George H. Bohlinger, executive associate commissioner for management at the
Immigration and Naturalization Service, said many companies see the
government "as an unresponsive bureaucracy" that fails to take advantage of
available technology.
"I don't think the problem at this point is in procurement," said Mark
Forman, the Office of Management and Budget's associate director for IT and
e-government. "I think the problem is in the requirements area." Until
missions and roles are clearly identified, he said, agencies do not know
what technology is needed to fulfill them.
Rep. Jim Turner (D-Texas) said many companies run into a dead end because
the current Office of Homeland Security lacks clear authority. The new
department could help resolve that, he said.
Rep. Jane Harman (D-Calif.), a member of the Select Intelligence Committee
who was briefed at the White House today about the president's plans, said
the new department would not be a magic bullet but an enabler for
information sharing.
"This topic is absolutely essential to the homeland security effort," she
said. "This is a critical piece."
******************
MSNBC
Public or Private?
Book Review: The struggle for control of the Internet is a modern version
of the range war, says David Bollier
By Peter McGrath
NEWSWEEK
June 10 issue It's almost human nature: if you're allowed the use of
something for enough time, you begin to think you have a right to it, even
that you own it. Take broadcast television. Its signals travel by means of
the electromagnetic spectrum, specifically that segment known colloquially
as the airwaves. The spectrum is a fact of the physical universe. Capital
didn't create it. It can't be improved by way of adding value. It's
inherently a public resource.
YET BROADCASTERS TREAT it like a birthright. When in 1996 they won
new frequencies for high-definition televisionat no chargethey were allowed
to retain their old spectrum allotments until 2006, or until 85 percent of
U.S. households had digital sets, whichever came later. Then they were
supposed to give it back to the public. Don't count on it. Broadcasters
would like to use their old spectrum for e-commerce, or resell it to
others. "They used to rob trains in the Old West," said Sen. John McCain of
the FCC giveaway. "Now we rob spectrum."
The electromagnetic spectrum is a prime example of what David
Bollier calls a "commons" in his provocative new book, "Silent Theft: The
Private Plunder of Our Common Wealth" (260 pages. Routledge. $26).
Historically, the word "commons" referred to real estatepublic grazing
grounds or tidewater fisheries. Today the term describes not only land such
as national forests, but also intangible assets like the human-gene
sequence. Bollier argues that in case after case of a resource once held to
belong to all, private interests are eroding public ownership. Is there oil
in the Arctic National Wildlife Refuge? Let industry appropriate the land.
Is there money to be made in manipulating the gene sequence? Let
biotechnology firms patent it. Tension between private and public interests
is as old as the republic, Bollier admits. "But today we live in a
troubling new stage of this struggle that differs in scope and ferocity
from previous ones."
Nowhere is this trend more apparent than with the Internet, says
Bollier: "Never has there been a commons as big, robust and socially
creative." Yet companies like Microsoft seek to impose proprietary
technical standards for Internet access while firms like AOL try to enclose
the Web experience within digital walls that resemble those of a shopping
mall. And why not? asks Silicon Valley. Its dominant view is that
"government" and "innovation" are mutually exclusive terms.
Against this is an inconvenient fact: private companies did nothing
to invent the Internet. It was the product of a partnership between
universities and the Feds. The process employed campus-based and
taxpayer-funded computer scientistswith their professional ethic of open
access to researchto design the system. As a result, writes Bollier, the
Net exhibits all the qualities of a commons. Its designers and end-users
were the same people. They developed technical standards that were open to
all. And they thought of themselves as a community based on no-cost access
to the network. Business hardly noticed. There was no money in a
bare-bones, text-based medium of exchange.
Then came the World Wide Web. It adapted the Internet to the
graphical-user interfaces pioneered by the Macintosh operating system and
universalized by Win-dows. Business awoke. The Internet as a visual medium:
that had commercial potential. A tiny company called Netscapenot the Raptor
from Redmondbegan privatizing the Web by tweaking the government-supported
Mosaic browser just enough for the upstart plausibly to claim it had made a
new product. Then Microsoft fought back. Everything that has happened
since, both in the marketplace and in court, has been a modern range war,
echoing the 19th-century struggle between ranchers and farmers over who had
the right to appropriate public property.
The Internet is only one place where public goes private. Take the
drug business. Bollier cites the cancer-treatment drug Taxol, developed
with federal funds and derived from trees found on federal lands, but
appropriated by Bristol-Myers Squibb because it had the $1 billion needed
to bring Taxol to market. Then there's the attempt to patent and thus
privatize information about the human-gene sequence. If anything is by
nature public information, it's the genetic code by which we exist. But
business doesn't see it that way.
Bollier can be tendentious. He goes out of his way to endorse
market forces, but you can tell his heart isn't really in it. He dislikes
privatization so much that he deplores the corporatization of stadium names
(Enron Field in Houston) equally with Microsoft's capture of the Internetas
though the Houston Astros weren't a corporation to begin with. Still,
Bollier raises issues that almost nobody wants to talk about anymore. If
he's not always right, he's always on target.
***********************
MSNBC
Analyzer gets 18-month jail term
Sentence increased from community service by appeals court
By Bob Sullivan
June 6 The Israeli teen-ager who sent U.S. government security experts on
a global dragnet four years ago was sentenced Wednesday to 18 months in
jail a big increase over the 6 months community service he first received.
Ehud Tenebaum's successful attacks on the Pentagon and other government
computers were initially viewed as potential acts of cyberwar by a foreign
government agents scrambled for a month as part of operation "Solar
Sunrise," but were red-faced when the trail led to two California
teen-agers and Tenebaum.
IT WAS LABELED "the most organized and systematic attack the
Pentagon has seen to date" at the time until computer forensics led
investigators to two California teen-agers and an Israeli hacker who called
himself "Analyzer."
"Analyzer" really Tenebaum, who was 18 then masterminded a series
of high-profile break-ins of systems at the Massachusetts Institute of
Technology, NASA, the FBI, the U.S. Air Force, and the U.S. Department of
Defense. He was nabbed by Israeli officials a month after breaking into the
Pentagon computers and has faced lengthy legal proceedings ever since.
Israel never considered extraditing him to the United States to face trial
there.
Using a combination of plea bargaining and popular sympathy even
then-Prime Minister Benjamin Netanyahu complimented Tenebaum's computer
skills after his arrest Tenebaum managed to escape initially with only 6
months of community service, one year's probation, and a fine.
"A day after [the first] verdict, he was a hero here in the biggest
papers," said Israeli computer security expert Boaz Guttman. "Most of the
people had arrived at the conclusion that he escaped from jail."
The Israeli government asked the appeals court to overrule the
earlier ruling by Kfar Saba Magistrate's Court, saying it was too lenient.
U.S. authorities were pushing for jail time, Guttman said.
And jail time Tenebaum now has. Wednesday, the Tel Aviv District
Court sentenced him to 18 months in jail, one year of supervised probation
and a stiff fine. Israeli computer security expert Boaz Guttman lauded the
stricter sentence, saying it sent the right message to other would-be hackers.
Many of the government systems Tenebaum broke into were insecure,
computer experts later revealed. Several just hadn't been updated with the
latest software patches.
Tenebaum still can appeal to Israel's Supreme Court. If he doesn't,
he will enter an Israeli jail on June 18.
**************************
Euromedia.net
Half of Germans don't want internet access
05/06/2002 Editor: Tamsin McMahon
About half of Germans don't have, or want, access to the internet,
especially the elderly, the poor and those with a low level of education,
the results of a new telephone poll show.
The poll, conducted by eMind@emnid, the internet research department of TNS
EMNID.
By May there were 26.7m German internet users older that 13, about 3m users
more than in the previous year. But the proportion of those who planned to
access the internet dropped to 8.2 per cent.
People who don't want internet access tend to be significant older and
mainly female, with a low level of education and with a low income, the
poll found. Most non-users live in urban areas and in the new federal states.
With a 37 per cent internet penetration rate, East Germany has fallen
behind West Germany with a 43 per cent rate. That digital gap extends to
the old federal states in general, eMind@emnid said.
The area stretching from Schleswig-Holstein to Bavaria had a high number of
internet users, while those in Northrhine-Westfalia, Rhineland-Pfalz and
Saarland tend to refuse internet access.
"The digital gap in Germany is no purely social problem," said IBM CEO
Erwin Staudt who chairs the Initiative D21.
"The high rate of internet- abstainers' is an obstacle to economic growth
and to a reduction of the unemployment rate. Political and economic efforts
must tackle this problem together."
The poll also found that the number of internet abstainers in some federal
states is increasing.
Last year, Berlin was the stronghold of internet users at a rate of 45 per
cent, a rate that was expected to continue growing.
However, it was the number of non-users that rose nearly six percentage
points in Berlin, which lost its top spot to Frankfurt. The German
financial metropolis has an internet penetration rate of 53 per cent.
Dresden, Stuttgart and Munich came next with rates of between 50 and 51 per
cent.
Dortmund leads list of places with the most internet abstainers at a rate
of 58 per cent, followed by Leipzig at 56 per cent and Essen at 53 per cent.
According to the Semiometrie, people with no internet access are rather
traditional and more interested in social and material issues. To them,
family and religion play a major role. On the other hand, internet users
are more oriented towards adventure, pleasure and competition.
Low internet use is mainly due to high costs, lack of equipment and
instruction, and little group-specific content.
Internet users are also experiencing their own digital divide: between
broadband and dial-up users, the poll found.
Broadband users tend to be those with a higher income who live in big
cities in the western part of Germany. The also seem to spend more time
online than their narrowband counterparts .
e-government is also very popular among the Germans, the poll says, as 87
per cent of those surveyed rated virtual city halls as attractive. The
German government plans to put most public services online by 2005.
********************
Euromedia.net
Government in Spain promises internet for all by 2004
04/06/2002 Editor: Bobby Mohanty
The Spanish Minister for Science and Technology, Anna Birules, confirmed
that internet access is to be available to all Spanish citizens by 2004.
This would put internet access on par with universal telecoms access. Under
this plan, the government expects to upgrade more than 255,000 rural
telephone lines, called TRAC, that can't currently provide internet access.
According to government estimates, about 70 per cent of the rural telecoms
network will be able to connect to the internet by end of next year.
The government has recently faced criticism in Parliament across party
lines for delays in implementing projects under its ambitious Information
Society plan.
Last year, only 28 per cent of Spanish adults connected to the internet.
That number rose to 70 per cent for companies and organisations, an
increase of 20 percentage points compared to 2000. The Minister dismissed
these numbers as being clearly insufficient.
On the other hand, ADSL users continue to grow in Spain. There are more
than 620,000 subscribers, according to latest figures. Telefonica alone
accounted for more than 500,000. Adding those who connect to the internet
over cable systems, there are an estimated 800,000 broadband users in Spain.
*********************
Euromedia.net
Turkish internet law faces strong opposition
29/05/2002 Editor: Tamsin McMahon
Print this article | Email this article to a friend
A new Turkish law that groups the internet under the same controls as the
rest of the country's media are facing harsh criticism from users, service
providers and the European Union.
Turkey's new broadcast law says ISPs could be face fines up to $195,000
(E210,000) for any libelous comments or "lying news" published on the web.
As part of the new legislation, websites may have to be officially
registered and submit their material to authorities for approval.
Until recently, the internet has been exempt from the same tough penalties
as newspapers and broadcasters, which has allowed websites to criticise the
government and publish news their mainstream media colleagues couldn't.
Service providers and web publishers say they're worried the new
regulations, which give the Supreme Radio and Television Board control over
the internet, will kill Turkey's booming online community.
"There's not going to be a certain direction, no freedom of speech and this
is going to impact the local content and local hosting services and
eventually the whole internet sector," Savas Unsal, managing director of
the country's biggest ISP, Superonline, told the BBC. "They might easily
put me and my chairman out of business."
Fikret Ilkiz, lawyer for Turkish daily paper Cumhuriyet criticised the new
law for being to general, leaving the door open for authorities to
prosecute ISPs for comments written in chatrooms.
"The way the law is now, it will be defined by many court cases," he said.
"For now, there is great uncertainty. No one knows what is legal and what
is not. It is chaos."
But the country's Minister of Transport and Communications, Oktay Vural,
said the law isn't meant to be restrictive, only to add a measure of
regulation to the internet. " We cannot be an eye in the chatrooms; that is
not the aim of that law."
However, Turkey's Constitutional Court may opt to repeal the law after
pressure from the European Union and Turkish President Ahmet Necdet Sezer,
who said the legislation violated the constitution.
*********************
Nando Times
Eight people injected with silicon chips
(June 7, 2002 11:35 a.m. EDT) - Eight people recently have been injected
with silicon chips, making them scannable just like a jar of peanut butter
in the supermarket checkout line.
The miniature devices, about the size of a grain of rice, were developed by
a Florida company. They will be targeted to families of Alzheimer's
patients - one of the fastest-growing groups in American society - as well
as others who have complicated medical histories. "It's a safety
precaution," explained Nate Isaacson. The retired building contractor
entered his Fort Lauderdale doctor's office on May 10 as an 83-year-old
with Alzheimer's.
He left it a cyborg, a man who is also a little bit of a computer.
The chip was put in Isaacson's upper back, effectively invisible unless a
hand-held scanner is waved over it. The scanner uses a radio frequency to
energize the dormant chip, which then transmits a signal containing an
identification number. Information about Isaacson is cross-referenced under
that number in a central computer registry.
Emergency room personnel, for instance, could find out who Isaacson is and
where he lives. They'd know that he is prone to forgetfulness, that he has
a pacemaker and is allergic to penicillin.
"You never know what's going to happen when you go out the door," said
Isaacson's wife, Micki. "Should something happen, he's never going to
remember those things."
Applied Digital Solutions Inc., the maker of what it calls the VeriChip,
says that it will soon have a prototype of a much more complex device, one
that is able to receive GPS satellite signals and transmit a person's
location.
It's a prospect deeply unsettling to privacy advocates, no matter how
voluntary the process may initially appear.
"Who gets to decide who gets chipped?" asked Marc Rotenberg, executive
director of the Electronic Privacy Information Center. "Parents will decide
that their kids should be implanted, or maybe their own aging parents. It's
an easier way to manage someone, like putting a leash on a pet."
Applied Digital, which says it has a waiting list of 4,000 to 5,000 people
who want a VeriChip, plans to operate a "chipmobile" that visits Florida
senior citizen's centers. An estimated 4 million people in the United
States have Alzheimer's, with more than 10 percent of them in Florida.
Jeffrey and Leslie Jacobs and their teenage son Derek, whose "chipping" was
a national media event, don't have problems with dementia. The Boca Raton,
Fla., family has a mixture of ailments and interests: Jeffrey has been
treated for Hodgkin's disease and suffers from other conditions for which
he takes 16 medications, while Derek is allergic to certain antibiotics.
Mostly, though, he's a computer buff who considers the procedure nifty. As
for Leslie, she's merely hoping to feel more secure in an insecure world.
A third group who had the simple outpatient procedure done are executives
of Applied Digital, a publicly traded company based in Palm Beach. Even
their publicist did it.
Getting chipped is easy. Making it more useful than a piece of body art
will be harder.
"There are a lot of practical issues here, as well as ethical and privacy
issues," said Mark Pafford, associate executive director of the Alzheimer's
Association's Southeast Florida chapter. "If it were me, I would use
something tried and proven, like a ID bracelet or a necklace that has an
800 number. This VeriChip seems like it would inhibit someone being
returned home in a timely fashion. Who knows how to look under someone's
skin?"
Applied Digital says that nearly all the major hospitals in the West Palm
Beach area will be equipped with the scanners. Yet St. Mary's Medical
Center, a major trauma center approached at random by a reporter, said no
one had contacted that hospital.
Isaacson's family says he has a bracelet. He also has a wallet with an ID.
"The VeriChip is more of a 'God forbid,'" said Sherry Gottlieb, Isaacson's
daughter. "You feel you have to have it, but hope you never need it."
Applied Digital is charging $200 for a chip, plus a $10 monthly fee to
store the information. As the first patients, Isaacson and the Jacobses are
getting their VeriChips for free, but that's the only financial
consideration they are receiving.
Isaacson's doctor, while agreeing to perform the insertion, has some qualms
about it. He consented to be interviewed but asked that his name not be
revealed. While protests against the VeriChip have been minimal, neither
the doctor nor Applied Digital are eager to see demonstrations. A few
religious groups say the chips are "the mark of the Beast" referred to in
the Bible.
"I think this is going to be the cutting edge of the future, because quick
information saves lives," Isaacson's doctor said. "I get calls 24 hours a
day informing me that a patient has had a stroke or a heart attack and is
in the hospital. I have to go to my office, get the chart and then go to
the hospital. All that takes time, while the patient is being treated with
limited information."
And yet this family practitioner doesn't see himself chipping any youthful
patients. While he believes the procedure is safe and the chip can always
be removed, he's worried about long-term liability. "You do something to a
young person, you may be responsible for years afterwards. He may be
carrying this chip for 70 or 80 years."
Long before then - by the end of the year, in fact - the next generation of
devices will be tested.
An embedded chip with GPS capabilities would be slightly larger than a
quarter and require actual surgery to implant. Unlike the VeriChip, it also
would require Food and Drug Administration approval. That will slow down
its U.S. introduction.
"We believe we have solved the battery issue, which leaves the question of
an antenna that can transmit through skin tissue," said Keith Bolton,
Applied Digital's chief scientist. The devices will be powered by lithium
ion batteries, which can be charged remotely from outside the body.
Applied Digital says it has already received considerable interest in the
VeriChip from both commercial and government sources in Brazil and Mexico,
and expects the embedded system to be big wherever there is a big threat of
kidnapping.
The prospect of such sales is no doubt one reason Applied Digital stock,
which traded as low as 11 cents in the last year, recently rose by over 20
percent to about $2.40.
Corporate insiders were sellers of the stock before the recent run-up,
which might indicate a lack of faith in the company's viability. The stock
closed Wednesday at 89 cents, up 1 cent, on Nasdaq.
Applied Digital is heavily indebted but says it will have actual earnings
this quarter before interest, taxes and depreciation are accounted for.
*****************
Sydney Morning Herald
Stolen moments
Online trading of unauthorised CDR recordings could spell the end of the
bootleg industry as we have known it, reports Jon Casimir.
Do you have a hankering to hear Bob Dylan's Pittsburgh show from February
1966? Or tapes from 1961, before he was famous? How about his rehearsal for
an MTV Unplugged special in 1994? The unreleased February 1969 recordings
he did with Johnny Cash? A concert from the current Love and Theft Tour?
Then head for the Bob Dylan Boot Database. It keeps track of hundreds of
recordings of the whiny little guy. All of them - shows, session out-takes,
unreleased songs, press conference tapes and other career offcuts - are
unauthorised by Dylan or his recording company. That is to say, they're
illegal. But that's not stopping them doing the rounds of a highly
networked, technologically literate Web community.
The Boot Database doesn't sell any of these recordings. Neither does it
make them available for direct download. What it does is something much
simpler, cheaper and more effective. It's a referral service, putting
owners of bootlegs in contact with each other, nurturing a CDR trading
circle (Compact Disc-Recordable, more formally CD-R, are discs you record
on, or burn, once). Its core is a "Who Has Which Boot?" database, a
searchable index of recordings cross-referenced with the people who own them.
The database user goes through a simple registration process (which
includes providing his or her own list of bootlegs), then requests a
recording via email. According to the site, database queries can be run
specifying year, date and location of the recording, as well as the
presence of other performers. A return email is sent with contact details
of members who have the right discs. The second trader gets in touch with
the first and bartering ensues.
"Over the past seven years," the site says, "hundreds of Dylan fans have
contributed information about their 'unauthorised' recordings and
volunteered to serve as contacts. The Bob Dylan Bootleg Database has
provided thousands of referrals."
The Boot Database is not the only site providing such a service. Bob's
Boots runs a smaller, more low-tech system, listing CDR traders for contact
in 28 countries (including a handful in Australia). And there are plenty of
others. If you type "Bob Dylan CDR trading" into the Google search engine,
you'll find more than 2000 matches. And the number increases daily.
While you're there, try tapping in the name of any other major act of the
past 40 years and you'll find that although Dylan's fans are among the most
organised of the online communities (they are, after all, the Star Trek
geeks of the music world - obsessive, completist, encyclopedic in their
knowledge), trading groups exist for an amazing range of acts.
Typing in "The Beatles CDR trading" will net you more than 2360 sites to
hunt through. Change the band name to U2 and you'll get 2200. Kiss returns
1980 matches, Pink Floyd 1850, Prince 1600, The Rolling Stones 1190 and
Bruce Springsteen 925, to name just a few. Local acts such as Midnight Oil,
Silverchair, Crowded House will net 200 or 300 suggestions each. Some of
these will lead to organised swap groups. Others are merely people listing
their collections online and hoping other traders will stumble across them.
But let's stick with the Bob example for a while longer. Those who wish to
research the bootlegs listed at the Boot Database before putting in
requests can use sites such as DylanBase, which has catalogued more than
1000 bootlegs, representing an archive of 11,000 performances of songs.
This place was set up to be "a giant bubbling information centre", full of
set lists, reviews, comments, trading lists and other information - all
supplied by volunteers. Its chief claim to fame is its song search engine -
if you want to find shows only at which Dylan played Series of Dreams or
Subterranean Homesick Blues, you can. The Bob Dylan CD & CDR Field
Recordings Guide Of William J. Clinton offers a similar level of
librarianship. Deep Beneath The Waves is an e-zine devoted to reviewing
only Dylan boots. But what do you do if you're a keen Dylan fan without any
bootlegs to trade? Well, that's been sorted out, too. Visit DylanTree, a
site which organises what traders call "trees", a simple and effective
model for the sharing of music.
CDR trees - which grow in many communities - work like this. A person who
has a recording posts a notice on site about it. Anyone who wants a copy
then signs up to the specific "tree". Two people are chosen to send blank
discs as well as return postage to the person at the top of the tree, who
has the original CD recording. He then burns copies of the concert and
sends it to them. These two people then receive blank discs and postage
from the four people on the next branch level of the tree. And so on. In
this way, one concert can be shared among many people without anyone having
to burn more than two copies for anyone else.
And what do you do when these blank CDs turn up in the mail and you think:
"Gee, I wish they had cover art"? Well, Dylantree has links to a raft of
amateur bootleg artwork sites which let users download high-quality scans
of homemade album covers (with names, track listings and the relevant
recording information) for laser printing. The quality of the graphic
design is as surprising as the quality of some of the recordings.
The fact that a sub-community of artists has attached itself to the trading
community indicates the scope and passion of the activity. There are even
free software programs for collectors who want to keep track of their
trading. Indeed, what is most startling about this whole business is the
level of organisation involved, the evolution that has taken place in the
few short years that we've had both the Net and the CD burner.
The Dylanophiles, and other groups like them, are not just networks,
they're societies - people coming together with common purpose, common
outlook and a well-defined moral code. At the core of that code is the
idea, shared among all CDR trading communities, that this material should
be shared rather than sold. Traders have managed, regardless of the law, to
elevate themselves, at least in their own eyes, to the moral high ground.
As long as what they're doing is not about money, they argue, then
everything is kosher. As far as they're concerned, CDR trading is an
expression of love for the artist, evidence of commitment.
John Mazcko, a US university student who runs Mega Superior Gold, a Ryan
Adams site which fosters a CDR trading community for one of the hottest new
stars of American music, says bootleg discs don't replace or compete with
the official work of an artist. Rather, they augment it, fuelling the
ardour among those who just can't get enough of the musicians they love.
"It may be illegal to trade," Mazcko says, "but I'm all about the music.
I'm definitely not ripping Ryan off at all. I can guarantee that just about
anyone who has bootlegged shows of his stuff also has the original albums."
Most trading sites have warnings not to sell or buy "field recordings"
plastered all over them. The Dylan Database, for example, assures visitors
that in all its time online, "not a single cent has changed hands - the
service is strictly not-for-profit and hobby-oriented".
As no cash is flowing in either direction, and most people trading are
likely to have bought everything the artist has offered them already, the
traders may have a point when they argue they're not hurting anybody. Add
to that an understanding that the kind of acts that are bootlegged are
mostly the acts that are already successful and you have to wonder how much
financial damage it does.
Mazcko reckons Adams has said at shows that he doesn't mind being taped and
seeing those recordings traded. And to be fair, there are acts out there
(none on major labels, which routinely include contract clauses to disallow
the practice) which let fans tape concerts - check the Bands That Allow
Taping site for proof.
But the truth is that all the good intentions and supposedly pure hearts of
the traders don't make any of their activities less illegal. Music industry
lawyer Shane Simpson says he has no doubt that what they do contravenes the
copyright laws, which see no distinction between trading and selling. Under
Australian law, anyone who performs on a recording must sign a consent
before that recording can be released to the public - so if it ain't
authorised, it ain't legal, whether money changes hands for it or not.
"There's no question about that," Simpson says. "Bartering, anything - it
makes no difference. Even if it's a gift. Once you have made it available
to someone else, you're over the line."
However, Simpson says, the question of whether CDR trading is legal really
isn't that interesting. The interesting question, in an age where the music
industry is paranoid about losing control of its product, is why aren't the
CDR traders, who aren't exactly skulking in the dark corners of the online
world, being prosecuted?
"It's a bit like home taping," he says. "No record company is going to pay
an expensive team of lawyers to get court orders to bust down the door of
some 14-year-old girl in Kogarah to raid her bedroom and take a CD burner.
Who'd want the flak?
"A lot of artists treat it [trading] as honorific. It happens because so
many people love them, and isn't that a lovely thing? Those that really
hate it, I imagine, are put off by the expense of doing anything. I don't
know what it would cost to run a case, but you'd want to have $100,000 in
the kick before saying, 'This looks like a good idea'."
Even if an artist did want to try to stop the practice, he or she would be
faced with the realisation that suing members of the fanbase for damages
would not just be bad publicity, it wouldn't return much cash. Then there
would be the problem of knowing where to start. CDR trading is not like
Napster - it doesn't have a centralised point of dissemination. It's
thousands of people in their homes. So it's not a situation where you could
kill the head and expect the body to die.
Simpson asks: "Exactly which of the Medusa heads do you attack? There's a
bit of a reality check when the artists go to their lawyer and the lawyer
says, 'Sure, put the money in the trust account and let's spend the next
three years chasing rabbits down holes.' Unless one of those Medusa heads
really is high, and they're really making a business out of it, then I
don't think it would be worth it."
This strange marriage of love and theft might last for a while, then.
***********************
Sydney Morning Herald
Are you switched on? turn viewers into active participants
Optus wants to turn viewers into active participants, writes Jenny Hailstone.
Picture this: you're watching television and a travel show advertises a
deal on midwinter island getaways. By pressing a button on the remote
control, you're instantly connected to a secure site where you enter your
credit card details and book your dream holiday. With the help of an
infrared keyboard, you then email the travel dates to your friends or
perhaps even search for a date to accompany you.
This is a scenario that Optus believes is the future of pay TV - it calls
it interactive television (iTV). Last December the pay TV provider moved to
a commercial trial of interactive television to test demand and gauge
reaction to pricing, says Optus spokesperson Melissa Favero.
Optus triallists pay $39.95 a month plus installation costs for a basic
interactive package that allows them to send email, visit content partners'
sites, chat, shop, order extra programming, and listen to the radio via
their TV. The package also includes a searchable electronic program guide,
14 TV channels and six free-to-air channels. There are now more than 3000
paying customers in the trial.
Last October, a "trigger-based advertising campaign" illustrated the
powerful direct response potential of the medium. About 1000 Optus trial
households saw an icon appear on a MasterCard commercial, and by clicking a
button on their remote control, triallists were taken directly to a Web
site to register for a new "Summer Escape" promotion.
Interactive television is nothing new in Australia. More than 300,000
Austar satellite households now view an "enhanced" digital television
service with customised information such as local weather reports embedded
in the picture. About one third of these subscribers, who have a telephone
line connection to their set-top box, can enter competitions and vote on
various topics through their TV.
But interactive television has failed to take off in Australia for several
reasons. Greg Pettersen, business analyst with Jupiter Media Metrix,
observes that there are still a number of industry issues to work out.
Unlike the UK, where the government helped to provide incentives for
digital television by allowing multi-channelling, Australia does not allow
broadcasters other than the ABC and SBS to provide multi-channel services -
an important driver for the interactive television industry.
Second, there is the cost of buying overseas content. "The success of
interactive television is very much contingent on the pay TV shared-content
programming case being favourable to Foxtel and Optus," says Pettersen, who
adds that Foxtel has not digitised its network.
Under a sharing arrangement, Foxtel would on-sell television content to
providers such as Optus and therefore reduce the high costs of buying
content individually from Hollywood studios. The case is now before the
Australian Competition and Consumer Commission.
Third, there is still speculation about whether iTV will succeed
financially. "Interactive television revenues are at least a few years
off," says Pettersen.
Paul Carter, account director with the digital media company Victoria Real,
says that people are taking a more pragmatic approach. "It's a reflection
on the dotcom crash," he says.
Recent figures indicate gambling will provide a significant portion of
interactive television income. In the last six months of 2001, Britain's
leading pay TV provider, BSkyB, generated more than half its iTV revenue
from sports betting.
There are also doubts about whether couch potatoes will want to interact
with their television, traditionally a passive medium.
Despite this, there are calls for more Federal Government support for the
industry. Carter says: "As a medium, it's not going to go away. But it's
stalling. To be successful, interactive television needs to be highly
promoted."
**********************
NEWS.com
Homeland security plan skimps on tech
By Margaret Kane
Staff Writer, CNET News.com
President Bush's plan to set up a new cabinet-level homeland defense agency
would consolidate government efforts to protect the nation from high-tech
attacks, but there's little word yet on exactly how.
The new office would take over the "key cyber security activities"
performed by the Department of Commerce's Critical Infrastructure Assurance
Office CIAO and the FBI's National Infrastructure Protection Center NIPC.
It would use the General Services Administration's Federal Computer
Incident Response Center and assume the functions and assets of the Defense
Department's National Communications System to coordinate emergency
preparedness for the telecommunications sector.
Bush's plan, sketchy so far, hints that there will be some information
technology shuffling. The plan does call for "development of a single
enterprise architecture" designed to eliminate "sub-optimized, duplicative
and poorly coordinated" systems.
At first blush, it would appear that the president's plan may help the tech
sector, but analysts say that enhanced cyberdefenses don't necessarily mean
more spending.
"This reorganization of homeland defense agencies from 22 separate units
into one doesn't change the overall IT budget that these existing agencies
had," said James P. Lucier, an analyst at Prudential Securities.
Indeed, part of the plan encourages the new office to reduce "redundant" IT
spending.
"There would be rational prioritization of projects necessary to fund
homeland security missions based on an overall assessment of requirements
rather than a tendency to fund all good ideas beneficial to a separate
unit's individual needs, even if similar systems are already in place
elsewhere," the plan states.
But there may be more work for companies that help with IT integration,
Lucier said, since the new agency will need to bring together many
disparate projects.
The House Subcommittee on Technology and Procurement Policy will hold
hearings Friday on "Assessing Barriers to, and Technology Solutions for,
Robust Information Sharing," with testimony from companies including
WebMethods and Oracle.
And companies are already gearing up new sales pitches and focusing their
efforts on this new branch of government. Earlier this week, for instance,
Computer Sciences created a post of vice president for homeland security.
"(Computer Sciences) is working to address agencies' emerging needs in
establishing greater physical access control and identifying potential
threats using such tools as biometrics and cross-enterprise databases," the
company said.
*********************
Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 507
1100 Seventeenth Street, NW
Washington, D.C. 20036-4632
202-659-9711